blob: 8b634ada3723b6094fbc6cc1e4178084fbde9582 [file] [log] [blame]
Guido van Rossume7b146f2000-02-04 15:28:42 +00001"""An extensible library for opening URLs using a variety of protocols
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00002
3The simplest way to use this module is to call the urlopen function,
Tim Peterse1190062001-01-15 03:34:38 +00004which accepts a string containing a URL or a Request object (described
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00005below). It opens the URL and returns the results as file-like
6object; the returned object has some extra methods described below.
7
Jeremy Hyltone1906632002-10-11 17:27:55 +00008The OpenerDirector manages a collection of Handler objects that do
Tim Peterse1190062001-01-15 03:34:38 +00009all the actual work. Each Handler implements a particular protocol or
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000010option. The OpenerDirector is a composite object that invokes the
11Handlers needed to open the requested URL. For example, the
12HTTPHandler performs HTTP GET and POST requests and deals with
13non-error returns. The HTTPRedirectHandler automatically deals with
Raymond Hettinger024aaa12003-04-24 15:32:12 +000014HTTP 301, 302, 303 and 307 redirect errors, and the HTTPDigestAuthHandler
15deals with digest authentication.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000016
Facundo Batistaca90ca82007-03-05 16:31:54 +000017urlopen(url, data=None) -- Basic usage is the same as original
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000018urllib. pass the url and optionally data to post to an HTTP URL, and
Tim Peterse1190062001-01-15 03:34:38 +000019get a file-like object back. One difference is that you can also pass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000020a Request instance instead of URL. Raises a URLError (subclass of
21IOError); for HTTP errors, raises an HTTPError, which can also be
22treated as a valid response.
23
Facundo Batistaca90ca82007-03-05 16:31:54 +000024build_opener -- Function that creates a new OpenerDirector instance.
25Will install the default handlers. Accepts one or more Handlers as
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000026arguments, either instances or Handler classes that it will
Facundo Batistaca90ca82007-03-05 16:31:54 +000027instantiate. If one of the argument is a subclass of the default
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000028handler, the argument will be installed instead of the default.
29
Facundo Batistaca90ca82007-03-05 16:31:54 +000030install_opener -- Installs a new opener as the default opener.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000031
32objects of interest:
Senthil Kumaran51200272009-11-15 06:10:30 +000033
34OpenerDirector -- Sets up the User Agent as the Python-urllib client and manages
35the Handler classes, while dealing with requests and responses.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000036
Facundo Batistaca90ca82007-03-05 16:31:54 +000037Request -- An object that encapsulates the state of a request. The
38state can be as simple as the URL. It can also include extra HTTP
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000039headers, e.g. a User-Agent.
40
41BaseHandler --
42
43exceptions:
Facundo Batistaca90ca82007-03-05 16:31:54 +000044URLError -- A subclass of IOError, individual protocols have their own
45specific subclass.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000046
Facundo Batistaca90ca82007-03-05 16:31:54 +000047HTTPError -- Also a valid HTTP response, so you can treat an HTTP error
48as an exceptional event or valid response.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000049
50internals:
51BaseHandler and parent
52_call_chain conventions
53
54Example usage:
55
56import urllib2
57
58# set up authentication info
59authinfo = urllib2.HTTPBasicAuthHandler()
Neal Norwitz8eea9ac2007-04-24 04:53:12 +000060authinfo.add_password(realm='PDQ Application',
61 uri='https://mahler:8092/site-updates.py',
62 user='klem',
63 passwd='geheim$parole')
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000064
Moshe Zadka8a18e992001-03-01 08:40:42 +000065proxy_support = urllib2.ProxyHandler({"http" : "http://ahad-haam:3128"})
66
Tim Peterse1190062001-01-15 03:34:38 +000067# build a new opener that adds authentication and caching FTP handlers
Moshe Zadka8a18e992001-03-01 08:40:42 +000068opener = urllib2.build_opener(proxy_support, authinfo, urllib2.CacheFTPHandler)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000069
70# install it
71urllib2.install_opener(opener)
72
73f = urllib2.urlopen('http://www.python.org/')
74
75
76"""
77
78# XXX issues:
79# If an authentication error handler that tries to perform
Fred Draked5214b02001-11-08 17:19:29 +000080# authentication for some reason but fails, how should the error be
81# signalled? The client needs to know the HTTP error code. But if
82# the handler knows that the problem was, e.g., that it didn't know
83# that hash algo that requested in the challenge, it would be good to
84# pass that information along to the client, too.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000085# ftp errors aren't handled cleanly
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000086# check digest against correct (i.e. non-apache) implementation
87
Georg Brandlc5ffd912006-04-02 20:48:11 +000088# Possible extensions:
89# complex proxies XXX not sure what exactly was meant by this
90# abstract factory for opener
91
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +000092import base64
Georg Brandlbffb0bc2006-04-30 08:57:35 +000093import hashlib
Georg Brandl9d6da3e2006-05-17 15:17:00 +000094import httplib
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +000095import mimetools
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +000096import os
97import posixpath
98import random
99import re
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000100import socket
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000101import sys
102import time
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000103import urlparse
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000104import bisect
Senthil Kumaranb0d85fd2012-05-15 23:59:19 +0800105import warnings
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000106
107try:
108 from cStringIO import StringIO
109except ImportError:
110 from StringIO import StringIO
111
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -0600112# check for SSL
113try:
114 import ssl
115except ImportError:
116 _have_ssl = False
117else:
118 _have_ssl = True
119
Georg Brandl7fff58c2006-04-02 21:13:13 +0000120from urllib import (unwrap, unquote, splittype, splithost, quote,
Senthil Kumaran01fe5fa2012-07-07 17:37:53 -0700121 addinfourl, splitport, splittag, toBytes,
Brett Cannon88f801d2008-08-18 00:46:22 +0000122 splitattr, ftpwrapper, splituser, splitpasswd, splitvalue)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000123
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000124# support for FileHandler, proxies via environment variables
Senthil Kumaran27468662009-10-11 02:00:07 +0000125from urllib import localhost, url2pathname, getproxies, proxy_bypass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000126
Georg Brandl720096a2006-04-02 20:45:34 +0000127# used in User-Agent header sent
128__version__ = sys.version[:3]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000129
130_opener = None
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -0600131def urlopen(url, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT,
132 cafile=None, capath=None, cadefault=False, context=None):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000133 global _opener
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -0600134 if cafile or capath or cadefault:
135 if context is not None:
136 raise ValueError(
137 "You can't pass both context and any of cafile, capath, and "
138 "cadefault"
139 )
140 if not _have_ssl:
141 raise ValueError('SSL support not available')
Benjamin Peterson227f6e02014-12-07 13:41:26 -0500142 context = ssl.create_default_context(purpose=ssl.Purpose.SERVER_AUTH,
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -0600143 cafile=cafile,
144 capath=capath)
Benjamin Peterson227f6e02014-12-07 13:41:26 -0500145 https_handler = HTTPSHandler(context=context)
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -0600146 opener = build_opener(https_handler)
147 elif context:
148 https_handler = HTTPSHandler(context=context)
149 opener = build_opener(https_handler)
150 elif _opener is None:
151 _opener = opener = build_opener()
152 else:
153 opener = _opener
154 return opener.open(url, data, timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000155
156def install_opener(opener):
157 global _opener
158 _opener = opener
159
160# do these error classes make sense?
Tim Peterse1190062001-01-15 03:34:38 +0000161# make sure all of the IOError stuff is overridden. we just want to be
Fred Drakea87a5212002-08-13 13:59:55 +0000162# subtypes.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000163
164class URLError(IOError):
165 # URLError is a sub-type of IOError, but it doesn't share any of
Jeremy Hylton0a4a50d2003-10-06 05:15:13 +0000166 # the implementation. need to override __init__ and __str__.
167 # It sets self.args for compatibility with other EnvironmentError
168 # subclasses, but args doesn't have the typical format with errno in
169 # slot 0 and strerror in slot 1. This may be better than nothing.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000170 def __init__(self, reason):
Jeremy Hylton0a4a50d2003-10-06 05:15:13 +0000171 self.args = reason,
Fred Drake13a2c272000-02-10 17:17:14 +0000172 self.reason = reason
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000173
174 def __str__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000175 return '<urlopen error %s>' % self.reason
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000176
177class HTTPError(URLError, addinfourl):
178 """Raised when HTTP error occurs, but also acts like non-error return"""
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000179 __super_init = addinfourl.__init__
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000180
181 def __init__(self, url, code, msg, hdrs, fp):
Fred Drake13a2c272000-02-10 17:17:14 +0000182 self.code = code
183 self.msg = msg
184 self.hdrs = hdrs
185 self.fp = fp
Fred Drake13a2c272000-02-10 17:17:14 +0000186 self.filename = url
Jeremy Hylton40bbae32002-06-03 16:53:00 +0000187 # The addinfourl classes depend on fp being a valid file
188 # object. In some cases, the HTTPError may not have a valid
189 # file object. If this happens, the simplest workaround is to
Tim Petersc411dba2002-07-16 21:35:23 +0000190 # not initialize the base classes.
Jeremy Hylton40bbae32002-06-03 16:53:00 +0000191 if fp is not None:
Georg Brandl99bb5f32008-04-09 17:57:38 +0000192 self.__super_init(fp, hdrs, url, code)
Tim Peterse1190062001-01-15 03:34:38 +0000193
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000194 def __str__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000195 return 'HTTP Error %s: %s' % (self.code, self.msg)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000196
Jason R. Coombs974d8632011-11-07 10:44:25 -0500197 # since URLError specifies a .reason attribute, HTTPError should also
198 # provide this attribute. See issue13211 fo discussion.
199 @property
200 def reason(self):
201 return self.msg
202
Senthil Kumaranf8a6b002012-12-23 09:00:47 -0800203 def info(self):
204 return self.hdrs
205
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000206# copied from cookielib.py
Neal Norwitzb678ce52006-05-18 06:51:46 +0000207_cut_port_re = re.compile(r":\d+$")
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000208def request_host(request):
209 """Return request-host, as defined by RFC 2965.
210
211 Variation from RFC: returned value is lowercased, for convenient
212 comparison.
213
214 """
215 url = request.get_full_url()
216 host = urlparse.urlparse(url)[1]
217 if host == "":
218 host = request.get_header("Host", "")
219
220 # remove port, if present
Neal Norwitzb678ce52006-05-18 06:51:46 +0000221 host = _cut_port_re.sub("", host, 1)
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000222 return host.lower()
Moshe Zadka8a18e992001-03-01 08:40:42 +0000223
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000224class Request:
Moshe Zadka8a18e992001-03-01 08:40:42 +0000225
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000226 def __init__(self, url, data=None, headers={},
227 origin_req_host=None, unverifiable=False):
Fred Drake13a2c272000-02-10 17:17:14 +0000228 # unwrap('<URL:type://host/path>') --> 'type://host/path'
Senthil Kumaran5d60e562012-07-08 02:20:27 -0700229 self.__original = unwrap(url)
Senthil Kumaran49c44082011-04-13 07:31:45 +0800230 self.__original, self.__fragment = splittag(self.__original)
Fred Drake13a2c272000-02-10 17:17:14 +0000231 self.type = None
232 # self.__r_type is what's left after doing the splittype
233 self.host = None
234 self.port = None
Senthil Kumarane266f252009-05-24 09:14:50 +0000235 self._tunnel_host = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000236 self.data = data
Fred Drake13a2c272000-02-10 17:17:14 +0000237 self.headers = {}
Brett Cannonc8b188a2003-05-17 19:51:26 +0000238 for key, value in headers.items():
Brett Cannon86503b12003-05-12 07:29:42 +0000239 self.add_header(key, value)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000240 self.unredirected_hdrs = {}
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000241 if origin_req_host is None:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000242 origin_req_host = request_host(self)
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000243 self.origin_req_host = origin_req_host
244 self.unverifiable = unverifiable
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000245
246 def __getattr__(self, attr):
Fred Drake13a2c272000-02-10 17:17:14 +0000247 # XXX this is a fallback mechanism to guard against these
Tim Peterse1190062001-01-15 03:34:38 +0000248 # methods getting called in a non-standard order. this may be
Fred Drake13a2c272000-02-10 17:17:14 +0000249 # too complicated and/or unnecessary.
250 # XXX should the __r_XXX attributes be public?
Serhiy Storchaka43beaeb2016-01-18 10:35:40 +0200251 if attr in ('_Request__r_type', '_Request__r_host'):
252 getattr(self, 'get_' + attr[12:])()
253 return self.__dict__[attr]
Fred Drake13a2c272000-02-10 17:17:14 +0000254 raise AttributeError, attr
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000255
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000256 def get_method(self):
257 if self.has_data():
258 return "POST"
259 else:
260 return "GET"
261
Jeremy Hylton023518a2003-12-17 18:52:16 +0000262 # XXX these helper methods are lame
263
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000264 def add_data(self, data):
265 self.data = data
266
267 def has_data(self):
268 return self.data is not None
269
270 def get_data(self):
271 return self.data
272
273 def get_full_url(self):
Senthil Kumaran49c44082011-04-13 07:31:45 +0800274 if self.__fragment:
275 return '%s#%s' % (self.__original, self.__fragment)
276 else:
277 return self.__original
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000278
279 def get_type(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000280 if self.type is None:
281 self.type, self.__r_type = splittype(self.__original)
Jeremy Hylton78cae612001-05-09 15:49:24 +0000282 if self.type is None:
283 raise ValueError, "unknown url type: %s" % self.__original
Fred Drake13a2c272000-02-10 17:17:14 +0000284 return self.type
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000285
286 def get_host(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000287 if self.host is None:
288 self.host, self.__r_host = splithost(self.__r_type)
289 if self.host:
290 self.host = unquote(self.host)
291 return self.host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000292
293 def get_selector(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000294 return self.__r_host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000295
Moshe Zadka8a18e992001-03-01 08:40:42 +0000296 def set_proxy(self, host, type):
Senthil Kumarane266f252009-05-24 09:14:50 +0000297 if self.type == 'https' and not self._tunnel_host:
298 self._tunnel_host = self.host
299 else:
300 self.type = type
301 self.__r_host = self.__original
302
303 self.host = host
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000304
Facundo Batistaeb90b782008-08-16 14:44:07 +0000305 def has_proxy(self):
306 return self.__r_host == self.__original
307
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000308 def get_origin_req_host(self):
309 return self.origin_req_host
310
311 def is_unverifiable(self):
312 return self.unverifiable
313
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000314 def add_header(self, key, val):
Fred Drake13a2c272000-02-10 17:17:14 +0000315 # useful for something like authentication
Georg Brandl8c036cc2006-08-20 13:15:39 +0000316 self.headers[key.capitalize()] = val
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000317
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000318 def add_unredirected_header(self, key, val):
319 # will not be added to a redirected request
Georg Brandl8c036cc2006-08-20 13:15:39 +0000320 self.unredirected_hdrs[key.capitalize()] = val
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000321
322 def has_header(self, header_name):
Neal Norwitz1cdd3632004-06-07 03:49:50 +0000323 return (header_name in self.headers or
324 header_name in self.unredirected_hdrs)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000325
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000326 def get_header(self, header_name, default=None):
327 return self.headers.get(
328 header_name,
329 self.unredirected_hdrs.get(header_name, default))
330
331 def header_items(self):
332 hdrs = self.unredirected_hdrs.copy()
333 hdrs.update(self.headers)
334 return hdrs.items()
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000335
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000336class OpenerDirector:
337 def __init__(self):
Georg Brandl8d457c72005-06-26 22:01:35 +0000338 client_version = "Python-urllib/%s" % __version__
Georg Brandl8c036cc2006-08-20 13:15:39 +0000339 self.addheaders = [('User-agent', client_version)]
R. David Murray14f66352010-12-23 19:50:56 +0000340 # self.handlers is retained only for backward compatibility
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000341 self.handlers = []
R. David Murray14f66352010-12-23 19:50:56 +0000342 # manage the individual handlers
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000343 self.handle_open = {}
344 self.handle_error = {}
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000345 self.process_response = {}
346 self.process_request = {}
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000347
348 def add_handler(self, handler):
Georg Brandlf91149e2007-07-12 08:05:45 +0000349 if not hasattr(handler, "add_parent"):
350 raise TypeError("expected BaseHandler instance, got %r" %
351 type(handler))
352
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000353 added = False
Jeremy Hylton8b78b992001-10-09 16:18:45 +0000354 for meth in dir(handler):
Georg Brandl261e2512006-05-29 20:52:54 +0000355 if meth in ["redirect_request", "do_open", "proxy_open"]:
356 # oops, coincidental match
357 continue
358
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000359 i = meth.find("_")
360 protocol = meth[:i]
361 condition = meth[i+1:]
362
363 if condition.startswith("error"):
Neal Norwitz1cdd3632004-06-07 03:49:50 +0000364 j = condition.find("_") + i + 1
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000365 kind = meth[j+1:]
366 try:
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000367 kind = int(kind)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000368 except ValueError:
369 pass
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000370 lookup = self.handle_error.get(protocol, {})
371 self.handle_error[protocol] = lookup
372 elif condition == "open":
373 kind = protocol
Raymond Hettingerf7bf02d2005-02-05 14:37:06 +0000374 lookup = self.handle_open
375 elif condition == "response":
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000376 kind = protocol
Raymond Hettingerf7bf02d2005-02-05 14:37:06 +0000377 lookup = self.process_response
378 elif condition == "request":
379 kind = protocol
380 lookup = self.process_request
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000381 else:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000382 continue
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000383
384 handlers = lookup.setdefault(kind, [])
385 if handlers:
386 bisect.insort(handlers, handler)
387 else:
388 handlers.append(handler)
389 added = True
390
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000391 if added:
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000392 bisect.insort(self.handlers, handler)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000393 handler.add_parent(self)
Tim Peterse1190062001-01-15 03:34:38 +0000394
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000395 def close(self):
Jeremy Hyltondce391c2003-12-15 16:08:48 +0000396 # Only exists for backwards compatibility.
397 pass
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000398
399 def _call_chain(self, chain, kind, meth_name, *args):
Georg Brandlc5ffd912006-04-02 20:48:11 +0000400 # Handlers raise an exception if no one else should try to handle
401 # the request, or return None if they can't but another handler
402 # could. Otherwise, they return the response.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000403 handlers = chain.get(kind, ())
404 for handler in handlers:
405 func = getattr(handler, meth_name)
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000406
407 result = func(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000408 if result is not None:
409 return result
410
Facundo Batista4f1b1ed2008-05-29 16:39:26 +0000411 def open(self, fullurl, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT):
Fred Drake13a2c272000-02-10 17:17:14 +0000412 # accept a URL or a Request object
Walter Dörwald65230a22002-06-03 15:58:32 +0000413 if isinstance(fullurl, basestring):
Fred Drake13a2c272000-02-10 17:17:14 +0000414 req = Request(fullurl, data)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000415 else:
416 req = fullurl
417 if data is not None:
418 req.add_data(data)
Tim Peterse1190062001-01-15 03:34:38 +0000419
Facundo Batista10951d52007-06-06 17:15:23 +0000420 req.timeout = timeout
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000421 protocol = req.get_type()
422
423 # pre-process request
424 meth_name = protocol+"_request"
425 for processor in self.process_request.get(protocol, []):
426 meth = getattr(processor, meth_name)
427 req = meth(req)
428
429 response = self._open(req, data)
430
431 # post-process response
432 meth_name = protocol+"_response"
433 for processor in self.process_response.get(protocol, []):
434 meth = getattr(processor, meth_name)
435 response = meth(req, response)
436
437 return response
438
439 def _open(self, req, data=None):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000440 result = self._call_chain(self.handle_open, 'default',
Tim Peterse1190062001-01-15 03:34:38 +0000441 'default_open', req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000442 if result:
443 return result
444
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000445 protocol = req.get_type()
446 result = self._call_chain(self.handle_open, protocol, protocol +
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000447 '_open', req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000448 if result:
449 return result
450
451 return self._call_chain(self.handle_open, 'unknown',
452 'unknown_open', req)
453
454 def error(self, proto, *args):
Raymond Hettingerdbecd932005-02-06 06:57:08 +0000455 if proto in ('http', 'https'):
Fred Draked5214b02001-11-08 17:19:29 +0000456 # XXX http[s] protocols are special-cased
457 dict = self.handle_error['http'] # https is not different than http
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000458 proto = args[2] # YUCK!
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000459 meth_name = 'http_error_%s' % proto
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000460 http_err = 1
461 orig_args = args
462 else:
463 dict = self.handle_error
464 meth_name = proto + '_error'
465 http_err = 0
466 args = (dict, proto, meth_name) + args
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000467 result = self._call_chain(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000468 if result:
469 return result
470
471 if http_err:
472 args = (dict, 'default', 'http_error_default') + orig_args
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000473 return self._call_chain(*args)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000474
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000475# XXX probably also want an abstract factory that knows when it makes
476# sense to skip a superclass in favor of a subclass and when it might
477# make sense to include both
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000478
479def build_opener(*handlers):
480 """Create an opener object from a list of handlers.
481
482 The opener will use several default handlers, including support
Senthil Kumaran51200272009-11-15 06:10:30 +0000483 for HTTP, FTP and when applicable, HTTPS.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000484
485 If any of the handlers passed as arguments are subclasses of the
486 default handlers, the default handlers will not be used.
487 """
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000488 import types
489 def isclass(obj):
Benjamin Peterson4bb96fe2009-02-12 04:17:04 +0000490 return isinstance(obj, (types.ClassType, type))
Tim Peterse1190062001-01-15 03:34:38 +0000491
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000492 opener = OpenerDirector()
493 default_classes = [ProxyHandler, UnknownHandler, HTTPHandler,
494 HTTPDefaultErrorHandler, HTTPRedirectHandler,
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000495 FTPHandler, FileHandler, HTTPErrorProcessor]
Moshe Zadka8a18e992001-03-01 08:40:42 +0000496 if hasattr(httplib, 'HTTPS'):
497 default_classes.append(HTTPSHandler)
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000498 skip = set()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000499 for klass in default_classes:
500 for check in handlers:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000501 if isclass(check):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000502 if issubclass(check, klass):
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000503 skip.add(klass)
Jeremy Hylton8b78b992001-10-09 16:18:45 +0000504 elif isinstance(check, klass):
Amaury Forgeot d'Arc96865852008-04-22 21:14:41 +0000505 skip.add(klass)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000506 for klass in skip:
507 default_classes.remove(klass)
508
509 for klass in default_classes:
510 opener.add_handler(klass())
511
512 for h in handlers:
Georg Brandl9d6da3e2006-05-17 15:17:00 +0000513 if isclass(h):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000514 h = h()
515 opener.add_handler(h)
516 return opener
517
518class BaseHandler:
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000519 handler_order = 500
520
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000521 def add_parent(self, parent):
522 self.parent = parent
Tim Peters58eb11c2004-01-18 20:29:55 +0000523
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000524 def close(self):
Jeremy Hyltondce391c2003-12-15 16:08:48 +0000525 # Only exists for backwards compatibility
526 pass
Tim Peters58eb11c2004-01-18 20:29:55 +0000527
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000528 def __lt__(self, other):
529 if not hasattr(other, "handler_order"):
530 # Try to preserve the old behavior of having custom classes
531 # inserted after default ones (works only for custom user
532 # classes which are not aware of handler_order).
533 return True
534 return self.handler_order < other.handler_order
Tim Petersf545baa2003-06-15 23:26:30 +0000535
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000536
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000537class HTTPErrorProcessor(BaseHandler):
538 """Process HTTP error responses."""
539 handler_order = 1000 # after all other processing
540
541 def http_response(self, request, response):
542 code, msg, hdrs = response.code, response.msg, response.info()
543
Neal Norwitz0d4c06e2007-04-25 06:30:05 +0000544 # According to RFC 2616, "2xx" code indicates that the client's
Facundo Batista9fab9f12007-04-23 17:08:31 +0000545 # request was successfully received, understood, and accepted.
546 if not (200 <= code < 300):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000547 response = self.parent.error(
548 'http', request, response, code, msg, hdrs)
549
550 return response
551
552 https_response = http_response
553
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000554class HTTPDefaultErrorHandler(BaseHandler):
555 def http_error_default(self, req, fp, code, msg, hdrs):
Fred Drake13a2c272000-02-10 17:17:14 +0000556 raise HTTPError(req.get_full_url(), code, msg, hdrs, fp)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000557
558class HTTPRedirectHandler(BaseHandler):
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000559 # maximum number of redirections to any single URL
560 # this is needed because of the state that cookies introduce
561 max_repeats = 4
562 # maximum total number of redirections (regardless of URL) before
563 # assuming we're in a loop
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000564 max_redirections = 10
565
Jeremy Hylton03892952003-05-05 04:09:13 +0000566 def redirect_request(self, req, fp, code, msg, headers, newurl):
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000567 """Return a Request or None in response to a redirect.
568
Jeremy Hyltonaefae552003-07-10 13:30:12 +0000569 This is called by the http_error_30x methods when a
570 redirection response is received. If a redirection should
571 take place, return a new Request to allow http_error_30x to
572 perform the redirect. Otherwise, raise HTTPError if no-one
573 else should try to handle this url. Return None if you can't
574 but another Handler might.
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000575 """
Jeremy Hylton828023b2003-05-04 23:44:49 +0000576 m = req.get_method()
577 if (code in (301, 302, 303, 307) and m in ("GET", "HEAD")
Martin v. Löwis162f0812003-07-12 07:33:32 +0000578 or code in (301, 302, 303) and m == "POST"):
579 # Strictly (according to RFC 2616), 301 or 302 in response
580 # to a POST MUST NOT cause a redirection without confirmation
Jeremy Hylton828023b2003-05-04 23:44:49 +0000581 # from the user (of urllib2, in this case). In practice,
582 # essentially all clients do redirect in this case, so we
583 # do the same.
Georg Brandlddb84d72006-03-18 11:35:18 +0000584 # be conciliant with URIs containing a space
585 newurl = newurl.replace(' ', '%20')
Facundo Batista86371d62008-02-07 19:06:52 +0000586 newheaders = dict((k,v) for k,v in req.headers.items()
587 if k.lower() not in ("content-length", "content-type")
588 )
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000589 return Request(newurl,
Facundo Batista86371d62008-02-07 19:06:52 +0000590 headers=newheaders,
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000591 origin_req_host=req.get_origin_req_host(),
592 unverifiable=True)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000593 else:
Martin v. Löwise3b67bc2003-06-14 05:51:25 +0000594 raise HTTPError(req.get_full_url(), code, msg, headers, fp)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000595
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000596 # Implementation note: To avoid the server sending us into an
597 # infinite loop, the request object needs to track what URLs we
598 # have already seen. Do this by adding a handler-specific
599 # attribute to the Request object.
600 def http_error_302(self, req, fp, code, msg, headers):
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000601 # Some servers (incorrectly) return multiple Location headers
602 # (so probably same goes for URI). Use first header.
Raymond Hettinger54f02222002-06-01 14:18:47 +0000603 if 'location' in headers:
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000604 newurl = headers.getheaders('location')[0]
Raymond Hettinger54f02222002-06-01 14:18:47 +0000605 elif 'uri' in headers:
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000606 newurl = headers.getheaders('uri')[0]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000607 else:
608 return
Facundo Batista94f243a2008-08-17 03:38:39 +0000609
610 # fix a possible malformed URL
611 urlparts = urlparse.urlparse(newurl)
Martin Panter3079bbe2016-05-16 01:07:13 +0000612 if not urlparts.path and urlparts.netloc:
Facundo Batista94f243a2008-08-17 03:38:39 +0000613 urlparts = list(urlparts)
614 urlparts[2] = "/"
615 newurl = urlparse.urlunparse(urlparts)
616
Jeremy Hylton73574ee2000-10-12 18:54:18 +0000617 newurl = urlparse.urljoin(req.get_full_url(), newurl)
618
guido@google.com60a4a902011-03-24 08:07:45 -0700619 # For security reasons we do not allow redirects to protocols
guido@google.com2bc23b82011-03-24 10:44:17 -0700620 # other than HTTP, HTTPS or FTP.
guido@google.com60a4a902011-03-24 08:07:45 -0700621 newurl_lower = newurl.lower()
622 if not (newurl_lower.startswith('http://') or
guido@google.com2bc23b82011-03-24 10:44:17 -0700623 newurl_lower.startswith('https://') or
624 newurl_lower.startswith('ftp://')):
guido@google.comf1509302011-03-28 13:47:01 -0700625 raise HTTPError(newurl, code,
626 msg + " - Redirection to url '%s' is not allowed" %
627 newurl,
628 headers, fp)
guido@google.com60a4a902011-03-24 08:07:45 -0700629
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000630 # XXX Probably want to forget about the state of the current
631 # request, although that might interact poorly with other
632 # handlers that also use handler-specific request attributes
Jeremy Hylton03892952003-05-05 04:09:13 +0000633 new = self.redirect_request(req, fp, code, msg, headers, newurl)
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000634 if new is None:
635 return
636
637 # loop detection
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000638 # .redirect_dict has a key url if url was previously visited.
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000639 if hasattr(req, 'redirect_dict'):
640 visited = new.redirect_dict = req.redirect_dict
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000641 if (visited.get(newurl, 0) >= self.max_repeats or
642 len(visited) >= self.max_redirections):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000643 raise HTTPError(req.get_full_url(), code,
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000644 self.inf_msg + msg, headers, fp)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +0000645 else:
646 visited = new.redirect_dict = req.redirect_dict = {}
Martin v. Löwis2a6ba902004-05-31 18:22:40 +0000647 visited[newurl] = visited.get(newurl, 0) + 1
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000648
649 # Don't close the fp until we are sure that we won't use it
Tim Petersab9ba272001-08-09 21:40:30 +0000650 # with HTTPError.
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000651 fp.read()
652 fp.close()
653
Senthil Kumaran5fee4602009-07-19 02:43:43 +0000654 return self.parent.open(new, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000655
Raymond Hettinger024aaa12003-04-24 15:32:12 +0000656 http_error_301 = http_error_303 = http_error_307 = http_error_302
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000657
Martin v. Löwis162f0812003-07-12 07:33:32 +0000658 inf_msg = "The HTTP server returned a redirect error that would " \
Thomas Wouters7e474022000-07-16 12:04:32 +0000659 "lead to an infinite loop.\n" \
Martin v. Löwis162f0812003-07-12 07:33:32 +0000660 "The last 30x error message was:\n"
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000661
Georg Brandl720096a2006-04-02 20:45:34 +0000662
663def _parse_proxy(proxy):
664 """Return (scheme, user, password, host/port) given a URL or an authority.
665
666 If a URL is supplied, it must have an authority (host:port) component.
667 According to RFC 3986, having an authority component means the URL must
668 have two slashes after the scheme:
669
670 >>> _parse_proxy('file:/ftp.example.com/')
671 Traceback (most recent call last):
672 ValueError: proxy URL with no authority: 'file:/ftp.example.com/'
673
674 The first three items of the returned tuple may be None.
675
676 Examples of authority parsing:
677
678 >>> _parse_proxy('proxy.example.com')
679 (None, None, None, 'proxy.example.com')
680 >>> _parse_proxy('proxy.example.com:3128')
681 (None, None, None, 'proxy.example.com:3128')
682
683 The authority component may optionally include userinfo (assumed to be
684 username:password):
685
686 >>> _parse_proxy('joe:password@proxy.example.com')
687 (None, 'joe', 'password', 'proxy.example.com')
688 >>> _parse_proxy('joe:password@proxy.example.com:3128')
689 (None, 'joe', 'password', 'proxy.example.com:3128')
690
691 Same examples, but with URLs instead:
692
693 >>> _parse_proxy('http://proxy.example.com/')
694 ('http', None, None, 'proxy.example.com')
695 >>> _parse_proxy('http://proxy.example.com:3128/')
696 ('http', None, None, 'proxy.example.com:3128')
697 >>> _parse_proxy('http://joe:password@proxy.example.com/')
698 ('http', 'joe', 'password', 'proxy.example.com')
699 >>> _parse_proxy('http://joe:password@proxy.example.com:3128')
700 ('http', 'joe', 'password', 'proxy.example.com:3128')
701
702 Everything after the authority is ignored:
703
704 >>> _parse_proxy('ftp://joe:password@proxy.example.com/rubbish:3128')
705 ('ftp', 'joe', 'password', 'proxy.example.com')
706
707 Test for no trailing '/' case:
708
709 >>> _parse_proxy('http://joe:password@proxy.example.com')
710 ('http', 'joe', 'password', 'proxy.example.com')
711
712 """
Georg Brandl720096a2006-04-02 20:45:34 +0000713 scheme, r_scheme = splittype(proxy)
714 if not r_scheme.startswith("/"):
715 # authority
716 scheme = None
717 authority = proxy
718 else:
719 # URL
720 if not r_scheme.startswith("//"):
721 raise ValueError("proxy URL with no authority: %r" % proxy)
722 # We have an authority, so for RFC 3986-compliant URLs (by ss 3.
723 # and 3.3.), path is empty or starts with '/'
724 end = r_scheme.find("/", 2)
725 if end == -1:
726 end = None
727 authority = r_scheme[2:end]
728 userinfo, hostport = splituser(authority)
729 if userinfo is not None:
730 user, password = splitpasswd(userinfo)
731 else:
732 user = password = None
733 return scheme, user, password, hostport
734
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000735class ProxyHandler(BaseHandler):
Gustavo Niemeyer9556fba2003-06-07 17:53:08 +0000736 # Proxies must be in front
737 handler_order = 100
738
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000739 def __init__(self, proxies=None):
Fred Drake13a2c272000-02-10 17:17:14 +0000740 if proxies is None:
741 proxies = getproxies()
742 assert hasattr(proxies, 'has_key'), "proxies must be a mapping"
743 self.proxies = proxies
Brett Cannondf0d87a2003-05-18 02:25:07 +0000744 for type, url in proxies.items():
Tim Peterse1190062001-01-15 03:34:38 +0000745 setattr(self, '%s_open' % type,
Fred Drake13a2c272000-02-10 17:17:14 +0000746 lambda r, proxy=url, type=type, meth=self.proxy_open: \
747 meth(r, proxy, type))
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000748
749 def proxy_open(self, req, proxy, type):
Fred Drake13a2c272000-02-10 17:17:14 +0000750 orig_type = req.get_type()
Georg Brandl720096a2006-04-02 20:45:34 +0000751 proxy_type, user, password, hostport = _parse_proxy(proxy)
Senthil Kumaran27468662009-10-11 02:00:07 +0000752
Georg Brandl720096a2006-04-02 20:45:34 +0000753 if proxy_type is None:
754 proxy_type = orig_type
Senthil Kumaran27468662009-10-11 02:00:07 +0000755
756 if req.host and proxy_bypass(req.host):
757 return None
758
Georg Brandl531ceba2006-01-21 07:20:56 +0000759 if user and password:
Georg Brandl720096a2006-04-02 20:45:34 +0000760 user_pass = '%s:%s' % (unquote(user), unquote(password))
Andrew M. Kuchling872dba42006-10-27 17:11:23 +0000761 creds = base64.b64encode(user_pass).strip()
Georg Brandl8c036cc2006-08-20 13:15:39 +0000762 req.add_header('Proxy-authorization', 'Basic ' + creds)
Georg Brandl720096a2006-04-02 20:45:34 +0000763 hostport = unquote(hostport)
764 req.set_proxy(hostport, proxy_type)
Senthil Kumaran27468662009-10-11 02:00:07 +0000765
Senthil Kumarane266f252009-05-24 09:14:50 +0000766 if orig_type == proxy_type or orig_type == 'https':
Fred Drake13a2c272000-02-10 17:17:14 +0000767 # let other handlers take care of it
Fred Drake13a2c272000-02-10 17:17:14 +0000768 return None
769 else:
770 # need to start over, because the other handlers don't
771 # grok the proxy's URL type
Georg Brandl720096a2006-04-02 20:45:34 +0000772 # e.g. if we have a constructor arg proxies like so:
773 # {'http': 'ftp://proxy.example.com'}, we may end up turning
774 # a request for http://acme.example.com/a into one for
775 # ftp://proxy.example.com/a
Senthil Kumaran5fee4602009-07-19 02:43:43 +0000776 return self.parent.open(req, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000777
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000778class HTTPPasswordMgr:
Georg Brandlfa42bd72006-04-30 07:06:11 +0000779
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000780 def __init__(self):
Fred Drake13a2c272000-02-10 17:17:14 +0000781 self.passwd = {}
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000782
783 def add_password(self, realm, uri, user, passwd):
Fred Drake13a2c272000-02-10 17:17:14 +0000784 # uri could be a single URI or a sequence
Walter Dörwald65230a22002-06-03 15:58:32 +0000785 if isinstance(uri, basestring):
Fred Drake13a2c272000-02-10 17:17:14 +0000786 uri = [uri]
Raymond Hettinger54f02222002-06-01 14:18:47 +0000787 if not realm in self.passwd:
Fred Drake13a2c272000-02-10 17:17:14 +0000788 self.passwd[realm] = {}
Georg Brandl2b330372006-05-28 20:23:12 +0000789 for default_port in True, False:
790 reduced_uri = tuple(
791 [self.reduce_uri(u, default_port) for u in uri])
792 self.passwd[realm][reduced_uri] = (user, passwd)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000793
794 def find_user_password(self, realm, authuri):
Fred Drake13a2c272000-02-10 17:17:14 +0000795 domains = self.passwd.get(realm, {})
Georg Brandl2b330372006-05-28 20:23:12 +0000796 for default_port in True, False:
797 reduced_authuri = self.reduce_uri(authuri, default_port)
798 for uris, authinfo in domains.iteritems():
799 for uri in uris:
800 if self.is_suburi(uri, reduced_authuri):
801 return authinfo
Fred Drake13a2c272000-02-10 17:17:14 +0000802 return None, None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000803
Georg Brandl2b330372006-05-28 20:23:12 +0000804 def reduce_uri(self, uri, default_port=True):
805 """Accept authority or URI and extract only the authority and path."""
806 # note HTTP URLs do not have a userinfo component
Georg Brandlfa42bd72006-04-30 07:06:11 +0000807 parts = urlparse.urlsplit(uri)
Fred Drake13a2c272000-02-10 17:17:14 +0000808 if parts[1]:
Georg Brandlfa42bd72006-04-30 07:06:11 +0000809 # URI
Georg Brandl2b330372006-05-28 20:23:12 +0000810 scheme = parts[0]
811 authority = parts[1]
812 path = parts[2] or '/'
Fred Drake13a2c272000-02-10 17:17:14 +0000813 else:
Georg Brandl2b330372006-05-28 20:23:12 +0000814 # host or host:port
815 scheme = None
816 authority = uri
817 path = '/'
818 host, port = splitport(authority)
819 if default_port and port is None and scheme is not None:
820 dport = {"http": 80,
821 "https": 443,
822 }.get(scheme)
823 if dport is not None:
824 authority = "%s:%d" % (host, dport)
825 return authority, path
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000826
827 def is_suburi(self, base, test):
Fred Drake13a2c272000-02-10 17:17:14 +0000828 """Check if test is below base in a URI tree
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000829
Fred Drake13a2c272000-02-10 17:17:14 +0000830 Both args must be URIs in reduced form.
831 """
832 if base == test:
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000833 return True
Fred Drake13a2c272000-02-10 17:17:14 +0000834 if base[0] != test[0]:
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000835 return False
Moshe Zadka8a18e992001-03-01 08:40:42 +0000836 common = posixpath.commonprefix((base[1], test[1]))
Fred Drake13a2c272000-02-10 17:17:14 +0000837 if len(common) == len(base[1]):
Guido van Rossum8ca162f2002-04-07 06:36:23 +0000838 return True
839 return False
Tim Peterse1190062001-01-15 03:34:38 +0000840
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000841
Moshe Zadka8a18e992001-03-01 08:40:42 +0000842class HTTPPasswordMgrWithDefaultRealm(HTTPPasswordMgr):
843
844 def find_user_password(self, realm, authuri):
Jeremy Hyltonaefae552003-07-10 13:30:12 +0000845 user, password = HTTPPasswordMgr.find_user_password(self, realm,
846 authuri)
Moshe Zadka8a18e992001-03-01 08:40:42 +0000847 if user is not None:
848 return user, password
849 return HTTPPasswordMgr.find_user_password(self, None, authuri)
850
851
852class AbstractBasicAuthHandler:
853
Georg Brandl172e7252007-03-07 07:39:06 +0000854 # XXX this allows for multiple auth-schemes, but will stupidly pick
855 # the last one with a realm specified.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000856
Georg Brandl33124322008-03-21 19:54:00 +0000857 # allow for double- and single-quoted realm values
858 # (single quotes are a violation of the RFC, but appear in the wild)
859 rx = re.compile('(?:.*,)*[ \t]*([^ \t]+)[ \t]+'
Senthil Kumaran6a2a6c22012-05-15 22:24:10 +0800860 'realm=(["\']?)([^"\']*)\\2', re.I)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000861
Georg Brandl261e2512006-05-29 20:52:54 +0000862 # XXX could pre-emptively send auth info already accepted (RFC 2617,
863 # end of section 2, and section 1.2 immediately after "credentials"
864 # production).
865
Moshe Zadka8a18e992001-03-01 08:40:42 +0000866 def __init__(self, password_mgr=None):
867 if password_mgr is None:
868 password_mgr = HTTPPasswordMgr()
869 self.passwd = password_mgr
Fred Drake13a2c272000-02-10 17:17:14 +0000870 self.add_password = self.passwd.add_password
Tim Peterse1190062001-01-15 03:34:38 +0000871
Senthil Kumaran4f1ba0d2010-08-19 17:32:03 +0000872
Moshe Zadka8a18e992001-03-01 08:40:42 +0000873 def http_error_auth_reqed(self, authreq, host, req, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000874 # host may be an authority (without userinfo) or a URL with an
875 # authority
Moshe Zadka8a18e992001-03-01 08:40:42 +0000876 # XXX could be multiple headers
877 authreq = headers.get(authreq, None)
Senthil Kumaran4f0108b2010-06-01 12:40:07 +0000878
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000879 if authreq:
Martin v. Löwis65a79752004-08-03 12:59:55 +0000880 mo = AbstractBasicAuthHandler.rx.search(authreq)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000881 if mo:
Georg Brandl33124322008-03-21 19:54:00 +0000882 scheme, quote, realm = mo.groups()
Senthil Kumaranb0d85fd2012-05-15 23:59:19 +0800883 if quote not in ['"', "'"]:
884 warnings.warn("Basic Auth Realm was unquoted",
885 UserWarning, 2)
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000886 if scheme.lower() == 'basic':
Senthil Kumaran0088b622014-08-20 07:52:59 +0530887 return self.retry_http_basic_auth(host, req, realm)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000888
Moshe Zadka8a18e992001-03-01 08:40:42 +0000889 def retry_http_basic_auth(self, host, req, realm):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000890 user, pw = self.passwd.find_user_password(realm, host)
Martin v. Löwis8b3e8712004-05-06 01:41:26 +0000891 if pw is not None:
Fred Drake13a2c272000-02-10 17:17:14 +0000892 raw = "%s:%s" % (user, pw)
Andrew M. Kuchling872dba42006-10-27 17:11:23 +0000893 auth = 'Basic %s' % base64.b64encode(raw).strip()
Senthil Kumaran0088b622014-08-20 07:52:59 +0530894 if req.get_header(self.auth_header, None) == auth:
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000895 return None
Senthil Kumaran8526adf2010-02-24 16:45:46 +0000896 req.add_unredirected_header(self.auth_header, auth)
Senthil Kumaran5fee4602009-07-19 02:43:43 +0000897 return self.parent.open(req, timeout=req.timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000898 else:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000899 return None
900
Georg Brandlfa42bd72006-04-30 07:06:11 +0000901
Moshe Zadka8a18e992001-03-01 08:40:42 +0000902class HTTPBasicAuthHandler(AbstractBasicAuthHandler, BaseHandler):
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000903
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000904 auth_header = 'Authorization'
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000905
Moshe Zadka8a18e992001-03-01 08:40:42 +0000906 def http_error_401(self, req, fp, code, msg, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000907 url = req.get_full_url()
Senthil Kumaran4f1ba0d2010-08-19 17:32:03 +0000908 response = self.http_error_auth_reqed('www-authenticate',
909 url, req, headers)
Senthil Kumaran4f1ba0d2010-08-19 17:32:03 +0000910 return response
Moshe Zadka8a18e992001-03-01 08:40:42 +0000911
912
913class ProxyBasicAuthHandler(AbstractBasicAuthHandler, BaseHandler):
914
Georg Brandl8c036cc2006-08-20 13:15:39 +0000915 auth_header = 'Proxy-authorization'
Moshe Zadka8a18e992001-03-01 08:40:42 +0000916
917 def http_error_407(self, req, fp, code, msg, headers):
Georg Brandlfa42bd72006-04-30 07:06:11 +0000918 # http_error_auth_reqed requires that there is no userinfo component in
919 # authority. Assume there isn't one, since urllib2 does not (and
920 # should not, RFC 3986 s. 3.2.1) support requests for URLs containing
921 # userinfo.
922 authority = req.get_host()
Senthil Kumaran4f1ba0d2010-08-19 17:32:03 +0000923 response = self.http_error_auth_reqed('proxy-authenticate',
Georg Brandlfa42bd72006-04-30 07:06:11 +0000924 authority, req, headers)
Senthil Kumaran4f1ba0d2010-08-19 17:32:03 +0000925 return response
Moshe Zadka8a18e992001-03-01 08:40:42 +0000926
927
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000928def randombytes(n):
929 """Return n random bytes."""
930 # Use /dev/urandom if it is available. Fall back to random module
931 # if not. It might be worthwhile to extend this function to use
932 # other platform-specific mechanisms for getting random bytes.
933 if os.path.exists("/dev/urandom"):
934 f = open("/dev/urandom")
935 s = f.read(n)
936 f.close()
937 return s
938 else:
939 L = [chr(random.randrange(0, 256)) for i in range(n)]
940 return "".join(L)
941
Moshe Zadka8a18e992001-03-01 08:40:42 +0000942class AbstractDigestAuthHandler:
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000943 # Digest authentication is specified in RFC 2617.
944
945 # XXX The client does not inspect the Authentication-Info header
946 # in a successful response.
947
948 # XXX It should be possible to test this implementation against
949 # a mock server that just generates a static set of challenges.
950
951 # XXX qop="auth-int" supports is shaky
Moshe Zadka8a18e992001-03-01 08:40:42 +0000952
953 def __init__(self, passwd=None):
954 if passwd is None:
Jeremy Hylton54e99e82001-08-07 21:12:25 +0000955 passwd = HTTPPasswordMgr()
Moshe Zadka8a18e992001-03-01 08:40:42 +0000956 self.passwd = passwd
Fred Drake13a2c272000-02-10 17:17:14 +0000957 self.add_password = self.passwd.add_password
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000958 self.retried = 0
959 self.nonce_count = 0
Senthil Kumaran20eb4f02009-11-15 08:36:20 +0000960 self.last_nonce = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000961
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000962 def reset_retry_count(self):
963 self.retried = 0
964
965 def http_error_auth_reqed(self, auth_header, host, req, headers):
966 authreq = headers.get(auth_header, None)
967 if self.retried > 5:
968 # Don't fail endlessly - if we failed once, we'll probably
969 # fail a second time. Hm. Unless the Password Manager is
970 # prompting for the information. Crap. This isn't great
971 # but it's better than the current 'repeat until recursion
972 # depth exceeded' approach <wink>
Tim Peters58eb11c2004-01-18 20:29:55 +0000973 raise HTTPError(req.get_full_url(), 401, "digest auth failed",
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000974 headers, None)
975 else:
976 self.retried += 1
Fred Drake13a2c272000-02-10 17:17:14 +0000977 if authreq:
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000978 scheme = authreq.split()[0]
979 if scheme.lower() == 'digest':
Fred Drake13a2c272000-02-10 17:17:14 +0000980 return self.retry_http_digest_auth(req, authreq)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000981
982 def retry_http_digest_auth(self, req, auth):
Eric S. Raymondb08b2d32001-02-09 11:10:16 +0000983 token, challenge = auth.split(' ', 1)
Fred Drake13a2c272000-02-10 17:17:14 +0000984 chal = parse_keqv_list(parse_http_list(challenge))
985 auth = self.get_authorization(req, chal)
986 if auth:
Jeremy Hylton52a17be2001-11-09 16:46:51 +0000987 auth_val = 'Digest %s' % auth
988 if req.headers.get(self.auth_header, None) == auth_val:
989 return None
Georg Brandl852bb002006-05-03 05:05:02 +0000990 req.add_unredirected_header(self.auth_header, auth_val)
Senthil Kumaran5fee4602009-07-19 02:43:43 +0000991 resp = self.parent.open(req, timeout=req.timeout)
Fred Drake13a2c272000-02-10 17:17:14 +0000992 return resp
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +0000993
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +0000994 def get_cnonce(self, nonce):
995 # The cnonce-value is an opaque
996 # quoted string value provided by the client and used by both client
997 # and server to avoid chosen plaintext attacks, to provide mutual
998 # authentication, and to provide some message integrity protection.
999 # This isn't a fabulous effort, but it's probably Good Enough.
Georg Brandlbffb0bc2006-04-30 08:57:35 +00001000 dig = hashlib.sha1("%s:%s:%s:%s" % (self.nonce_count, nonce, time.ctime(),
1001 randombytes(8))).hexdigest()
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001002 return dig[:16]
1003
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001004 def get_authorization(self, req, chal):
Fred Drake13a2c272000-02-10 17:17:14 +00001005 try:
1006 realm = chal['realm']
1007 nonce = chal['nonce']
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001008 qop = chal.get('qop')
Fred Drake13a2c272000-02-10 17:17:14 +00001009 algorithm = chal.get('algorithm', 'MD5')
1010 # mod_digest doesn't send an opaque, even though it isn't
1011 # supposed to be optional
1012 opaque = chal.get('opaque', None)
1013 except KeyError:
1014 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001015
Fred Drake13a2c272000-02-10 17:17:14 +00001016 H, KD = self.get_algorithm_impls(algorithm)
1017 if H is None:
1018 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001019
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001020 user, pw = self.passwd.find_user_password(realm, req.get_full_url())
Fred Drake13a2c272000-02-10 17:17:14 +00001021 if user is None:
1022 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001023
Fred Drake13a2c272000-02-10 17:17:14 +00001024 # XXX not implemented yet
1025 if req.has_data():
1026 entdig = self.get_entity_digest(req.get_data(), chal)
1027 else:
1028 entdig = None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001029
Fred Drake13a2c272000-02-10 17:17:14 +00001030 A1 = "%s:%s:%s" % (user, realm, pw)
Johannes Gijsberscdd625a2005-01-09 05:51:49 +00001031 A2 = "%s:%s" % (req.get_method(),
Fred Drake13a2c272000-02-10 17:17:14 +00001032 # XXX selector: what about proxies and full urls
1033 req.get_selector())
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001034 if qop == 'auth':
Senthil Kumaran20eb4f02009-11-15 08:36:20 +00001035 if nonce == self.last_nonce:
1036 self.nonce_count += 1
1037 else:
1038 self.nonce_count = 1
1039 self.last_nonce = nonce
1040
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001041 ncvalue = '%08x' % self.nonce_count
1042 cnonce = self.get_cnonce(nonce)
1043 noncebit = "%s:%s:%s:%s:%s" % (nonce, ncvalue, cnonce, qop, H(A2))
1044 respdig = KD(H(A1), noncebit)
1045 elif qop is None:
1046 respdig = KD(H(A1), "%s:%s" % (nonce, H(A2)))
1047 else:
1048 # XXX handle auth-int.
Georg Brandlff871222007-06-07 13:34:10 +00001049 raise URLError("qop '%s' is not supported." % qop)
Tim Peters58eb11c2004-01-18 20:29:55 +00001050
Fred Drake13a2c272000-02-10 17:17:14 +00001051 # XXX should the partial digests be encoded too?
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001052
Fred Drake13a2c272000-02-10 17:17:14 +00001053 base = 'username="%s", realm="%s", nonce="%s", uri="%s", ' \
1054 'response="%s"' % (user, realm, nonce, req.get_selector(),
1055 respdig)
1056 if opaque:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001057 base += ', opaque="%s"' % opaque
Fred Drake13a2c272000-02-10 17:17:14 +00001058 if entdig:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001059 base += ', digest="%s"' % entdig
1060 base += ', algorithm="%s"' % algorithm
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001061 if qop:
Jeremy Hyltonb300ae32004-12-22 14:27:19 +00001062 base += ', qop=auth, nc=%s, cnonce="%s"' % (ncvalue, cnonce)
Fred Drake13a2c272000-02-10 17:17:14 +00001063 return base
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001064
1065 def get_algorithm_impls(self, algorithm):
Georg Brandl8d66dcd2008-05-04 21:40:44 +00001066 # algorithm should be case-insensitive according to RFC2617
1067 algorithm = algorithm.upper()
Fred Drake13a2c272000-02-10 17:17:14 +00001068 # lambdas assume digest modules are imported at the top level
1069 if algorithm == 'MD5':
Georg Brandlbffb0bc2006-04-30 08:57:35 +00001070 H = lambda x: hashlib.md5(x).hexdigest()
Fred Drake13a2c272000-02-10 17:17:14 +00001071 elif algorithm == 'SHA':
Georg Brandlbffb0bc2006-04-30 08:57:35 +00001072 H = lambda x: hashlib.sha1(x).hexdigest()
Fred Drake13a2c272000-02-10 17:17:14 +00001073 # XXX MD5-sess
Berker Peksag87640b32016-03-06 16:27:23 +02001074 else:
1075 raise ValueError("Unsupported digest authentication "
1076 "algorithm %r" % algorithm.lower())
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001077 KD = lambda s, d: H("%s:%s" % (s, d))
Fred Drake13a2c272000-02-10 17:17:14 +00001078 return H, KD
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001079
1080 def get_entity_digest(self, data, chal):
Fred Drake13a2c272000-02-10 17:17:14 +00001081 # XXX not implemented yet
1082 return None
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001083
Moshe Zadka8a18e992001-03-01 08:40:42 +00001084
1085class HTTPDigestAuthHandler(BaseHandler, AbstractDigestAuthHandler):
1086 """An authentication protocol defined by RFC 2069
1087
1088 Digest authentication improves on basic authentication because it
1089 does not transmit passwords in the clear.
1090 """
1091
Jeremy Hyltonaefae552003-07-10 13:30:12 +00001092 auth_header = 'Authorization'
Georg Brandl261e2512006-05-29 20:52:54 +00001093 handler_order = 490 # before Basic auth
Moshe Zadka8a18e992001-03-01 08:40:42 +00001094
1095 def http_error_401(self, req, fp, code, msg, headers):
1096 host = urlparse.urlparse(req.get_full_url())[1]
Tim Peters58eb11c2004-01-18 20:29:55 +00001097 retry = self.http_error_auth_reqed('www-authenticate',
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001098 host, req, headers)
1099 self.reset_retry_count()
1100 return retry
Moshe Zadka8a18e992001-03-01 08:40:42 +00001101
1102
1103class ProxyDigestAuthHandler(BaseHandler, AbstractDigestAuthHandler):
1104
Jeremy Hyltonaefae552003-07-10 13:30:12 +00001105 auth_header = 'Proxy-Authorization'
Georg Brandl261e2512006-05-29 20:52:54 +00001106 handler_order = 490 # before Basic auth
Moshe Zadka8a18e992001-03-01 08:40:42 +00001107
1108 def http_error_407(self, req, fp, code, msg, headers):
1109 host = req.get_host()
Tim Peters58eb11c2004-01-18 20:29:55 +00001110 retry = self.http_error_auth_reqed('proxy-authenticate',
Jeremy Hyltonfcefd0d2003-10-21 18:07:07 +00001111 host, req, headers)
1112 self.reset_retry_count()
1113 return retry
Tim Peterse1190062001-01-15 03:34:38 +00001114
Moshe Zadka8a18e992001-03-01 08:40:42 +00001115class AbstractHTTPHandler(BaseHandler):
1116
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001117 def __init__(self, debuglevel=0):
1118 self._debuglevel = debuglevel
1119
1120 def set_http_debuglevel(self, level):
1121 self._debuglevel = level
1122
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001123 def do_request_(self, request):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001124 host = request.get_host()
1125 if not host:
1126 raise URLError('no host given')
1127
1128 if request.has_data(): # POST
1129 data = request.get_data()
Georg Brandl8c036cc2006-08-20 13:15:39 +00001130 if not request.has_header('Content-type'):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001131 request.add_unredirected_header(
Georg Brandl8c036cc2006-08-20 13:15:39 +00001132 'Content-type',
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001133 'application/x-www-form-urlencoded')
Georg Brandl8c036cc2006-08-20 13:15:39 +00001134 if not request.has_header('Content-length'):
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001135 request.add_unredirected_header(
Georg Brandl8c036cc2006-08-20 13:15:39 +00001136 'Content-length', '%d' % len(data))
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001137
Facundo Batistaeb90b782008-08-16 14:44:07 +00001138 sel_host = host
1139 if request.has_proxy():
1140 scheme, sel = splittype(request.get_selector())
1141 sel_host, sel_path = splithost(sel)
1142
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001143 if not request.has_header('Host'):
Facundo Batistaeb90b782008-08-16 14:44:07 +00001144 request.add_unredirected_header('Host', sel_host)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001145 for name, value in self.parent.addheaders:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001146 name = name.capitalize()
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001147 if not request.has_header(name):
1148 request.add_unredirected_header(name, value)
1149
1150 return request
1151
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -06001152 def do_open(self, http_class, req, **http_conn_args):
Jeremy Hylton023518a2003-12-17 18:52:16 +00001153 """Return an addinfourl object for the request, using http_class.
1154
1155 http_class must implement the HTTPConnection API from httplib.
1156 The addinfourl return value is a file-like object. It also
1157 has methods and attributes including:
1158 - info(): return a mimetools.Message object for the headers
1159 - geturl(): return the original request URL
1160 - code: HTTP status code
1161 """
Moshe Zadka76676802001-04-11 07:44:53 +00001162 host = req.get_host()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001163 if not host:
1164 raise URLError('no host given')
1165
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -06001166 # will parse host:port
1167 h = http_class(host, timeout=req.timeout, **http_conn_args)
Jeremy Hyltonc1be59f2003-12-14 05:27:34 +00001168 h.set_debuglevel(self._debuglevel)
Tim Peterse1190062001-01-15 03:34:38 +00001169
Senthil Kumaran176c73d2010-09-27 01:40:59 +00001170 headers = dict(req.unredirected_hdrs)
1171 headers.update(dict((k, v) for k, v in req.headers.items()
1172 if k not in headers))
1173
Jeremy Hyltonb3ee6f92004-02-24 19:40:35 +00001174 # We want to make an HTTP/1.1 request, but the addinfourl
1175 # class isn't prepared to deal with a persistent connection.
1176 # It will try to read all remaining data from the socket,
1177 # which will block while the server waits for the next request.
1178 # So make sure the connection gets closed after the (only)
1179 # request.
1180 headers["Connection"] = "close"
Georg Brandl8c036cc2006-08-20 13:15:39 +00001181 headers = dict(
1182 (name.title(), val) for name, val in headers.items())
Senthil Kumarane266f252009-05-24 09:14:50 +00001183
1184 if req._tunnel_host:
Senthil Kumaran7713acf2009-12-20 06:05:13 +00001185 tunnel_headers = {}
1186 proxy_auth_hdr = "Proxy-Authorization"
1187 if proxy_auth_hdr in headers:
1188 tunnel_headers[proxy_auth_hdr] = headers[proxy_auth_hdr]
1189 # Proxy-Authorization should not be sent to origin
1190 # server.
1191 del headers[proxy_auth_hdr]
1192 h.set_tunnel(req._tunnel_host, headers=tunnel_headers)
Senthil Kumarane266f252009-05-24 09:14:50 +00001193
Jeremy Hylton828023b2003-05-04 23:44:49 +00001194 try:
Jeremy Hylton023518a2003-12-17 18:52:16 +00001195 h.request(req.get_method(), req.get_selector(), req.data, headers)
Senthil Kumaran7d7702b2011-07-27 09:37:17 +08001196 except socket.error, err: # XXX what error?
1197 h.close()
1198 raise URLError(err)
1199 else:
Kristján Valur Jónsson3c43fcb2009-01-11 16:23:37 +00001200 try:
1201 r = h.getresponse(buffering=True)
Senthil Kumaran7d7702b2011-07-27 09:37:17 +08001202 except TypeError: # buffering kw not supported
Kristján Valur Jónsson3c43fcb2009-01-11 16:23:37 +00001203 r = h.getresponse()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001204
Andrew M. Kuchlingf9ea7c02004-07-10 15:34:34 +00001205 # Pick apart the HTTPResponse object to get the addinfourl
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001206 # object initialized properly.
1207
1208 # Wrap the HTTPResponse object in socket's file object adapter
1209 # for Windows. That adapter calls recv(), so delegate recv()
1210 # to read(). This weird wrapping allows the returned object to
1211 # have readline() and readlines() methods.
Tim Peters9ca3f852004-08-08 01:05:14 +00001212
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001213 # XXX It might be better to extract the read buffering code
1214 # out of socket._fileobject() and into a base class.
Tim Peters9ca3f852004-08-08 01:05:14 +00001215
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001216 r.recv = r.read
Georg Brandldd7b0522007-01-21 10:35:10 +00001217 fp = socket._fileobject(r, close=True)
Tim Peters9ca3f852004-08-08 01:05:14 +00001218
Jeremy Hylton5d9c3032004-08-07 17:40:50 +00001219 resp = addinfourl(fp, r.msg, req.get_full_url())
Andrew M. Kuchlingf9ea7c02004-07-10 15:34:34 +00001220 resp.code = r.status
1221 resp.msg = r.reason
1222 return resp
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001223
Moshe Zadka8a18e992001-03-01 08:40:42 +00001224
1225class HTTPHandler(AbstractHTTPHandler):
1226
1227 def http_open(self, req):
Jeremy Hylton023518a2003-12-17 18:52:16 +00001228 return self.do_open(httplib.HTTPConnection, req)
Moshe Zadka8a18e992001-03-01 08:40:42 +00001229
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001230 http_request = AbstractHTTPHandler.do_request_
Moshe Zadka8a18e992001-03-01 08:40:42 +00001231
1232if hasattr(httplib, 'HTTPS'):
1233 class HTTPSHandler(AbstractHTTPHandler):
1234
Benjamin Peterson227f6e02014-12-07 13:41:26 -05001235 def __init__(self, debuglevel=0, context=None):
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -06001236 AbstractHTTPHandler.__init__(self, debuglevel)
1237 self._context = context
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -06001238
Moshe Zadka8a18e992001-03-01 08:40:42 +00001239 def https_open(self, req):
Benjamin Petersonfcfb18e2014-11-23 11:42:45 -06001240 return self.do_open(httplib.HTTPSConnection, req,
Benjamin Peterson227f6e02014-12-07 13:41:26 -05001241 context=self._context)
Moshe Zadka8a18e992001-03-01 08:40:42 +00001242
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001243 https_request = AbstractHTTPHandler.do_request_
1244
1245class HTTPCookieProcessor(BaseHandler):
1246 def __init__(self, cookiejar=None):
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001247 import cookielib
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001248 if cookiejar is None:
Neal Norwitz1cdd3632004-06-07 03:49:50 +00001249 cookiejar = cookielib.CookieJar()
Martin v. Löwis2a6ba902004-05-31 18:22:40 +00001250 self.cookiejar = cookiejar
1251
1252 def http_request(self, request):
1253 self.cookiejar.add_cookie_header(request)
1254 return request
1255
1256 def http_response(self, request, response):
1257 self.cookiejar.extract_cookies(response, request)
1258 return response
1259
1260 https_request = http_request
1261 https_response = http_response
Moshe Zadka8a18e992001-03-01 08:40:42 +00001262
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001263class UnknownHandler(BaseHandler):
1264 def unknown_open(self, req):
Fred Drake13a2c272000-02-10 17:17:14 +00001265 type = req.get_type()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001266 raise URLError('unknown url type: %s' % type)
1267
1268def parse_keqv_list(l):
1269 """Parse list of key=value strings where keys are not duplicated."""
1270 parsed = {}
1271 for elt in l:
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001272 k, v = elt.split('=', 1)
Fred Drake13a2c272000-02-10 17:17:14 +00001273 if v[0] == '"' and v[-1] == '"':
1274 v = v[1:-1]
1275 parsed[k] = v
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001276 return parsed
1277
1278def parse_http_list(s):
1279 """Parse lists as described by RFC 2068 Section 2.
Tim Peters9e34c042005-08-26 15:20:46 +00001280
Andrew M. Kuchling22ab06e2004-04-06 19:43:03 +00001281 In particular, parse comma-separated lists where the elements of
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001282 the list may include quoted-strings. A quoted-string could
Georg Brandle1b13d22005-08-24 22:20:32 +00001283 contain a comma. A non-quoted string could have quotes in the
1284 middle. Neither commas nor quotes count if they are escaped.
1285 Only double-quotes count, not single-quotes.
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001286 """
Georg Brandle1b13d22005-08-24 22:20:32 +00001287 res = []
1288 part = ''
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001289
Georg Brandle1b13d22005-08-24 22:20:32 +00001290 escape = quote = False
1291 for cur in s:
1292 if escape:
1293 part += cur
1294 escape = False
1295 continue
1296 if quote:
1297 if cur == '\\':
1298 escape = True
Fred Drake13a2c272000-02-10 17:17:14 +00001299 continue
Georg Brandle1b13d22005-08-24 22:20:32 +00001300 elif cur == '"':
1301 quote = False
1302 part += cur
1303 continue
1304
1305 if cur == ',':
1306 res.append(part)
1307 part = ''
1308 continue
1309
1310 if cur == '"':
1311 quote = True
Tim Peters9e34c042005-08-26 15:20:46 +00001312
Georg Brandle1b13d22005-08-24 22:20:32 +00001313 part += cur
1314
1315 # append last part
1316 if part:
1317 res.append(part)
1318
1319 return [part.strip() for part in res]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001320
Senthil Kumaran7cc0fe42010-08-11 18:18:22 +00001321def _safe_gethostbyname(host):
1322 try:
1323 return socket.gethostbyname(host)
1324 except socket.gaierror:
1325 return None
1326
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001327class FileHandler(BaseHandler):
1328 # Use local file or FTP depending on form of URL
1329 def file_open(self, req):
Fred Drake13a2c272000-02-10 17:17:14 +00001330 url = req.get_selector()
Senthil Kumaran87ed31a2010-07-11 03:18:51 +00001331 if url[:2] == '//' and url[2:3] != '/' and (req.host and
1332 req.host != 'localhost'):
Fred Drake13a2c272000-02-10 17:17:14 +00001333 req.type = 'ftp'
1334 return self.parent.open(req)
1335 else:
1336 return self.open_local_file(req)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001337
1338 # names for the localhost
1339 names = None
1340 def get_names(self):
Fred Drake13a2c272000-02-10 17:17:14 +00001341 if FileHandler.names is None:
Georg Brandl4eb521e2006-04-02 20:37:17 +00001342 try:
Senthil Kumaran13c2ef92009-12-27 09:11:09 +00001343 FileHandler.names = tuple(
1344 socket.gethostbyname_ex('localhost')[2] +
1345 socket.gethostbyname_ex(socket.gethostname())[2])
Georg Brandl4eb521e2006-04-02 20:37:17 +00001346 except socket.gaierror:
1347 FileHandler.names = (socket.gethostbyname('localhost'),)
Fred Drake13a2c272000-02-10 17:17:14 +00001348 return FileHandler.names
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001349
1350 # not entirely sure what the rules are here
1351 def open_local_file(self, req):
Georg Brandl5a096e12007-01-22 19:40:21 +00001352 import email.utils
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001353 import mimetypes
Fred Drake13a2c272000-02-10 17:17:14 +00001354 host = req.get_host()
Senthil Kumaran18e4dd72010-05-08 05:00:11 +00001355 filename = req.get_selector()
1356 localfile = url2pathname(filename)
Georg Brandlceede5c2007-03-13 08:14:27 +00001357 try:
1358 stats = os.stat(localfile)
1359 size = stats.st_size
1360 modified = email.utils.formatdate(stats.st_mtime, usegmt=True)
Senthil Kumaran18e4dd72010-05-08 05:00:11 +00001361 mtype = mimetypes.guess_type(filename)[0]
Georg Brandlceede5c2007-03-13 08:14:27 +00001362 headers = mimetools.Message(StringIO(
1363 'Content-type: %s\nContent-length: %d\nLast-modified: %s\n' %
1364 (mtype or 'text/plain', size, modified)))
1365 if host:
1366 host, port = splitport(host)
1367 if not host or \
Senthil Kumaran7cc0fe42010-08-11 18:18:22 +00001368 (not port and _safe_gethostbyname(host) in self.get_names()):
Senthil Kumaran18e4dd72010-05-08 05:00:11 +00001369 if host:
1370 origurl = 'file://' + host + filename
1371 else:
1372 origurl = 'file://' + filename
1373 return addinfourl(open(localfile, 'rb'), headers, origurl)
Georg Brandlceede5c2007-03-13 08:14:27 +00001374 except OSError, msg:
1375 # urllib2 users shouldn't expect OSErrors coming from urlopen()
1376 raise URLError(msg)
Fred Drake13a2c272000-02-10 17:17:14 +00001377 raise URLError('file not on local host')
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001378
1379class FTPHandler(BaseHandler):
1380 def ftp_open(self, req):
Georg Brandl9d6da3e2006-05-17 15:17:00 +00001381 import ftplib
1382 import mimetypes
Fred Drake13a2c272000-02-10 17:17:14 +00001383 host = req.get_host()
1384 if not host:
Neal Norwitz70700942008-01-24 07:40:51 +00001385 raise URLError('ftp error: no host given')
Martin v. Löwisa79449e2004-02-15 21:19:18 +00001386 host, port = splitport(host)
1387 if port is None:
1388 port = ftplib.FTP_PORT
Kurt B. Kaiser3f7cb5d2004-07-11 17:14:13 +00001389 else:
1390 port = int(port)
Martin v. Löwisa79449e2004-02-15 21:19:18 +00001391
1392 # username/password handling
1393 user, host = splituser(host)
1394 if user:
1395 user, passwd = splitpasswd(user)
1396 else:
1397 passwd = None
1398 host = unquote(host)
Senthil Kumaran9fce5512010-11-20 11:24:08 +00001399 user = user or ''
1400 passwd = passwd or ''
Martin v. Löwisa79449e2004-02-15 21:19:18 +00001401
Jeremy Hylton73574ee2000-10-12 18:54:18 +00001402 try:
1403 host = socket.gethostbyname(host)
1404 except socket.error, msg:
1405 raise URLError(msg)
Fred Drake13a2c272000-02-10 17:17:14 +00001406 path, attrs = splitattr(req.get_selector())
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001407 dirs = path.split('/')
Martin v. Löwis7db04e72004-02-15 20:51:39 +00001408 dirs = map(unquote, dirs)
Fred Drake13a2c272000-02-10 17:17:14 +00001409 dirs, file = dirs[:-1], dirs[-1]
1410 if dirs and not dirs[0]:
1411 dirs = dirs[1:]
Fred Drake13a2c272000-02-10 17:17:14 +00001412 try:
Facundo Batista10951d52007-06-06 17:15:23 +00001413 fw = self.connect_ftp(user, passwd, host, port, dirs, req.timeout)
Fred Drake13a2c272000-02-10 17:17:14 +00001414 type = file and 'I' or 'D'
1415 for attr in attrs:
Kurt B. Kaiser3f7cb5d2004-07-11 17:14:13 +00001416 attr, value = splitvalue(attr)
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001417 if attr.lower() == 'type' and \
Fred Drake13a2c272000-02-10 17:17:14 +00001418 value in ('a', 'A', 'i', 'I', 'd', 'D'):
Eric S. Raymondb08b2d32001-02-09 11:10:16 +00001419 type = value.upper()
Fred Drake13a2c272000-02-10 17:17:14 +00001420 fp, retrlen = fw.retrfile(file, type)
Guido van Rossum833a8d82001-08-24 13:10:13 +00001421 headers = ""
1422 mtype = mimetypes.guess_type(req.get_full_url())[0]
1423 if mtype:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001424 headers += "Content-type: %s\n" % mtype
Fred Drake13a2c272000-02-10 17:17:14 +00001425 if retrlen is not None and retrlen >= 0:
Georg Brandl8c036cc2006-08-20 13:15:39 +00001426 headers += "Content-length: %d\n" % retrlen
Guido van Rossum833a8d82001-08-24 13:10:13 +00001427 sf = StringIO(headers)
1428 headers = mimetools.Message(sf)
Fred Drake13a2c272000-02-10 17:17:14 +00001429 return addinfourl(fp, headers, req.get_full_url())
1430 except ftplib.all_errors, msg:
Neal Norwitz70700942008-01-24 07:40:51 +00001431 raise URLError, ('ftp error: %s' % msg), sys.exc_info()[2]
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001432
Facundo Batista10951d52007-06-06 17:15:23 +00001433 def connect_ftp(self, user, passwd, host, port, dirs, timeout):
Nadeem Vawdab42c53e2011-07-23 15:51:16 +02001434 fw = ftpwrapper(user, passwd, host, port, dirs, timeout,
1435 persistent=False)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001436## fw.ftp.set_debuglevel(1)
1437 return fw
1438
1439class CacheFTPHandler(FTPHandler):
1440 # XXX would be nice to have pluggable cache strategies
1441 # XXX this stuff is definitely not thread safe
1442 def __init__(self):
1443 self.cache = {}
1444 self.timeout = {}
1445 self.soonest = 0
1446 self.delay = 60
Fred Drake13a2c272000-02-10 17:17:14 +00001447 self.max_conns = 16
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001448
1449 def setTimeout(self, t):
1450 self.delay = t
1451
1452 def setMaxConns(self, m):
Fred Drake13a2c272000-02-10 17:17:14 +00001453 self.max_conns = m
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001454
Facundo Batista10951d52007-06-06 17:15:23 +00001455 def connect_ftp(self, user, passwd, host, port, dirs, timeout):
1456 key = user, host, port, '/'.join(dirs), timeout
Raymond Hettinger54f02222002-06-01 14:18:47 +00001457 if key in self.cache:
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001458 self.timeout[key] = time.time() + self.delay
1459 else:
Facundo Batista10951d52007-06-06 17:15:23 +00001460 self.cache[key] = ftpwrapper(user, passwd, host, port, dirs, timeout)
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001461 self.timeout[key] = time.time() + self.delay
Fred Drake13a2c272000-02-10 17:17:14 +00001462 self.check_cache()
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001463 return self.cache[key]
1464
1465 def check_cache(self):
Fred Drake13a2c272000-02-10 17:17:14 +00001466 # first check for old ones
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001467 t = time.time()
1468 if self.soonest <= t:
Raymond Hettinger4ec4fa22003-05-23 08:51:51 +00001469 for k, v in self.timeout.items():
Jeremy Hylton6d7e47b2000-01-20 18:19:08 +00001470 if v < t:
1471 self.cache[k].close()
1472 del self.cache[k]
1473 del self.timeout[k]
1474 self.soonest = min(self.timeout.values())
1475
1476 # then check the size
Fred Drake13a2c272000-02-10 17:17:14 +00001477 if len(self.cache) == self.max_conns:
Brett Cannonc8b188a2003-05-17 19:51:26 +00001478 for k, v in self.timeout.items():
Fred Drake13a2c272000-02-10 17:17:14 +00001479 if v == self.soonest:
1480 del self.cache[k]
1481 del self.timeout[k]
1482 break
1483 self.soonest = min(self.timeout.values())
Nadeem Vawdab42c53e2011-07-23 15:51:16 +02001484
1485 def clear_cache(self):
1486 for conn in self.cache.values():
1487 conn.close()
1488 self.cache.clear()
1489 self.timeout.clear()